Tracer Placement with Limitation nodes in Protection Area
碩士 === 中華大學 === 資訊工程學系碩士班 === 99 === Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers. Then attack traffic can be blocked by filte...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/33532800697451790321 |
id |
ndltd-TW-099CHPI5392046 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099CHPI53920462015-10-13T20:22:59Z http://ndltd.ncl.edu.tw/handle/33532800697451790321 Tracer Placement with Limitation nodes in Protection Area 可控制防禦區域內節點數量追蹤器的佈建方法 Ven-Chen Cheng 陳文誠 碩士 中華大學 資訊工程學系碩士班 99 Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers. Then attack traffic can be blocked by filter nodes close to attack origins. In addition, the log of attack origins can be used to the evidence for post-attack law enforcement. The performance of locating attack origins will depend on the number of deployed tracers and location of them. In previous work, tracers are placed to surround a network area which we referred to as protection area. Attack path can be guaranteed to travel at least one tracer within a limit hop count and attack origins can be traced back to which protection area is.But the cost of searching real attack origins will be high once the number of nodes in protection area is too many. In this thesis, we proposed five methods to improve previous work by bounding the number of nodes in each protection area. Simulation results show that our proposed methods can limit the number of nodes in protection areas with a little extra tracers compared to previous work. Keywords: DDoS;Tracers Chun-Hsin Wang 王俊鑫 2011 學位論文 ; thesis 47 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中華大學 === 資訊工程學系碩士班 === 99 === Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers.
Then attack traffic can be blocked by filter nodes close to attack origins. In addition, the log of attack origins can be used to the evidence for post-attack law enforcement. The performance of locating attack origins will depend on the number of deployed tracers and location of them.
In previous work, tracers are placed to surround a network area which we referred to as protection area. Attack path can be guaranteed to travel at least one tracer within a limit hop count and attack origins can be traced back to which protection area is.But the cost of searching real attack origins will be high once the number of nodes in protection area is too many. In this thesis, we proposed five methods to improve previous work by bounding the number of nodes in each protection area.
Simulation results show that our proposed methods can limit the number of nodes in protection areas with a little extra tracers compared to previous work.
Keywords: DDoS;Tracers
|
author2 |
Chun-Hsin Wang |
author_facet |
Chun-Hsin Wang Ven-Chen Cheng 陳文誠 |
author |
Ven-Chen Cheng 陳文誠 |
spellingShingle |
Ven-Chen Cheng 陳文誠 Tracer Placement with Limitation nodes in Protection Area |
author_sort |
Ven-Chen Cheng |
title |
Tracer Placement with Limitation nodes in Protection Area |
title_short |
Tracer Placement with Limitation nodes in Protection Area |
title_full |
Tracer Placement with Limitation nodes in Protection Area |
title_fullStr |
Tracer Placement with Limitation nodes in Protection Area |
title_full_unstemmed |
Tracer Placement with Limitation nodes in Protection Area |
title_sort |
tracer placement with limitation nodes in protection area |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/33532800697451790321 |
work_keys_str_mv |
AT venchencheng tracerplacementwithlimitationnodesinprotectionarea AT chénwénchéng tracerplacementwithlimitationnodesinprotectionarea AT venchencheng kěkòngzhìfángyùqūyùnèijiédiǎnshùliàngzhuīzōngqìdebùjiànfāngfǎ AT chénwénchéng kěkòngzhìfángyùqūyùnèijiédiǎnshùliàngzhuīzōngqìdebùjiànfāngfǎ |
_version_ |
1718046367297830912 |